XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Data Hackers Small Business Hardware Hosted Solutions Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Network Security Innovation Efficiency IT Support Social Media Business Business Management IT Services Server Miscellaneous Business Continuity Smartphones Upgrade Virtualization Communication Windows Disaster Recovery Communications Data Backup Computer User Tips Managed IT Services Microsoft Office Users Passwords Mobile Device Management Browser Android Data Recovery Save Money WiFi Smartphone Marketing Alert Ransomware Holiday Vendor Management Cybercrime Mobile Computing BDR Tech Term Outsourced IT Windows 10 Internet of Things Chrome Operating System Remote Monitoring Bring Your Own Device Cloud Computing Apple BYOD Computers Information Technology Avoiding Downtime Cybersecurity Big Data Remote Computing Router Current Events IT Solutions The Internet of Things Going Green Best Practice History Artificial Intelligence Automation VPN Telephone Systems Firewall Phone System Wireless Technology IT Consultant Health Application Trending Collaboration Hacking Social Engineering Printer Managed IT Services Employer-Employee Relationship Facebook Spam Office Lithium-ion Battery Budget Bandwidth Excel App Money Proactive IT Business Intelligence Mouse Two-factor Authentication Business Managament Mobility Content Filtering How To Applications Productivity Fax Server Recovery Maintenance Windows 10 Windows 8 Unified Threat Management Networking iPhone Humor Hard Drives Private Cloud Training Outlook Redundancy Antivirus Law Enforcement Tutorials Virus Office 365 Data Protection Blockchain Encryption Analytics Apps Information Data Security Phishing PowerPoint Sports Managed IT Value Website User Error Gmail Customer Relationship Management Settings Retail Data Management Inbound Marketing Saving Time Downtime Word Network Congestion Administration Mobile Device File Sharing Memory Social Networking Digital Payment Computer Repair Analysis Conferencing Identity Theft Save Time Google Drive Tech Support Search Scam Tablet IT Support Office Tips Twitter IT Management Administrator Connectivity Vulnerability Document Management Compliance Servers Streaming Media Risk Management Flexibility Entertainment Meetings Instant Messaging Programming Content Management Social Environment Telephone System Skype Workers Infrastructure Human Resources DDoS Unsupported Software Augmented Reality Intranet Access Control Biometrics Solid State Drive Running Cable IT service Black Market Wearable Technology Update Data loss Smart Tech Webinar Touchscreen Hacker Machine Learning Wireless Physical Security Comparison Cleaning Password Spam Blocking Public Cloud Best Available Windows 7 Bluetooth SaaS Video Surveillance USB Robot People Paperless Office Data storage Voice over Internet Protocol Managed Service Samsung OneNote IBM Credit Cards Piracy Leadership eWaste Online Currency Internet Exlporer Recycling Data Storage Point of Sale PDF Safety Wi-Fi Education CES Virtual Assistant HaaS End of Support Keyboard Fraud Computer Accessories Government Work/Life Balance IT Plan Data Breach YouTube Statistics Alerts Consultant Healthcare Remote Support Reputation Lifestyle Inventory Remote Monitoring and Maintenance nternet Crowdfunding Flash Netflix Fiber-Optic Wireless Internet Warranty Software as a Service Root Cause Analysis IoT Internet exploMicrosoft Tip of the week Amazon Tools Computer Fan NIST Company Culture Supercomputer Telecommuting Text Messaging Cameras Thought Leadership E-Commerce NarrowBand Law Firm IT Work Station Licensing Electronic Health Records Customers Gaming Console Line of Business Uninterrupted Power Supply Sync Cables WIndows 7 Wire Microchip Virtual Reality Advertising LinkedIn Windows Server 2008 Amazon Web Services FENG Password Manager Cryptocurrency Distributed Denial of Service Files Net Neutrality Software Tips Knowledge Remote Work Printer Server Content Filter Shortcut Camera Chromecast User Help Desk Windows 8.1 Update Worker Commute Authentication MSP Patch Management Telephony Unified Communications Managing Stress Smart Office Domains Display Google Docs Screen Mirroring Staff Insurance Bloatware Notifications 360 Emails Online Shopping Laptop Electronic Medical Records Debate Botnet Business Mangement Science Safe Mode Colocation Storage HVAC SharePoint Business Owner Data Warehousing Specifications Nanotechnology Remote Worker Shadow IT Start Menu Windows 10s Theft Search Engine Charger Cast Digital Signature Webcam Practices Entrepreneur Hybrid Cloud Regulations Evernote Touchpad Hiring/Firing Travel Criminal Accountants Tablets Business Technology IaaS Computing Infrastructure HIPAA HBO Addiction Virtual Private Network Hiring/Firing Enterprise Content Management Relocation Millennials Windows Media Player Virtual Desktop Wiring Macro Legal Mobile Cortana Students Bing Monitor Computer Care Multi-Factor Security Strategy Hosted Computing Cost Management Proactive Co-managed IT Hosted Solution Wireless Charging PC Care IT Security Scheduling Upgrades Analyitcs Frequently Asked Questions 3D Cache Project Management Password Management Workforce eBay Devices Customer Service GDPR Print Server Professional Services Audit Google Apps Loyalty Books Battery Experience Content Video Games Two Factor Authentication Emergency Worker Regulation Music Scalability Audiobook Assessment Utility Computing Thank You Rootkit How to Politics Printers Television Techology Transportation Congratulations Troubleshooting Webinar Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: